https://newsletter.en.creamermedia.com
Africa|Business|Gold|Infrastructure|Innovation|Power|Risk Management|SECURITY|Services|Systems|Technology|Infrastructure
Africa|Business|Gold|Infrastructure|Innovation|Power|Risk Management|SECURITY|Services|Systems|Technology|Infrastructure
africa|business|gold|infrastructure|innovation|power|risk-management|security|services|systems|technology|infrastructure

The AI Gold Rush: Ensuring Security in South Africa's Business Landscape

Kate Mollett

Kate Mollett

12th July 2023

     

Font size: - +

This article has been supplied.

By Kate Mollett, Senior Director at Commvault Africa

The business world has also been caught up in the Artificial Intelligence (AI) fever, with discussions taking place in boardrooms and C-suites about how to leverage AI tools. Employees in many companies are downloading AI apps to explore their potential for enhancing mundane tasks, while in-house developers are actively seeking new data libraries to build around.

Secure Adoption in the Race for AI Integration

Responding to the market frenzy, business software vendors, from major players to niche vendors, are racing to introduce AI-based tools and features. According to IDC, enterprise spending on AI is projected to increase by 27% this year to reach $154 billion. With prudent planning and a focus on cybersecurity, organisations can confidently embrace the transformative power of AI in the business landscape.

However, organisations need to proceed with caution. The rush to adopt AI technology may lead companies to overlook critical security measures, leaving them vulnerable to devastating hacks. Many of the new AI tools are based on open-source infrastructure or data repositories, which necessitate a different defensive strategy from the proprietary tools used in the past. It is crucial for CIOs, CISOs, and other tech leaders within organisations to establish a process that allows security professionals to validate the libraries or platforms on which AI programs are based.

Safeguarding Against Open-Source Vulnerabilities

Open source, although a powerful tool, comes with its risks. South Africa, like many other regions, has witnessed instances of bad actors targeting open platforms. The SolarWinds hack serves as an example of the damage that can be caused by Information Technology (IT) supply chain breaches when thousands of data networks were compromised. Hence, the widespread adoption of open AI platforms by enterprises increases the potential for catastrophic IT supply chain breaches.

Fortunately, there are steps that security leaders can take to continuously evaluate open-source tools for vulnerabilities. Businesses must conduct thorough research on potential vendors providing IT services to the enterprise. Additionally, security teams should collaborate closely with development teams to assess the security protocols employed to safeguard open-source libraries. Once the in-house IT team confirms the security of repositories, they can establish access guidelines that enable employees to download preferred apps or utilise specific libraries to power machine learning algorithms. However, caution should still be exercised.

Evaluating and Monitoring AI Software

Both employees and security professionals need to evaluate the value that software brings against potential threats. Vendor scorecards can assist in assessing potential risks. Benchmarking IT providers against one another helps enterprises make informed decisions about which vendors to engage. Questions about development methodologies, code analysis, dynamic scanning capabilities, vulnerability remediation processes, and understanding the impact of supply chain hacks should be documented.

Once a vendor is deemed trustworthy, the responsibility does not end there. As more open-source tools are deployed, security teams must continuously monitor applications for unknown code or security breaches. AI can aid in this process by automating daily monitoring tasks, allowing analysts to focus on protecting next-generation AI software.

To stay ahead in the rapidly evolving AI landscape, businesses must prioritise robust security measures, including thorough vendor vetting and continuous monitoring of AI applications. By striking a balance between innovation and risk management, organisations can harness the power of AI while safeguarding their valuable data and systems. Embracing AI with caution and a proactive security mindset will enable businesses to navigate the AI gold rush with confidence and resilience.

Edited by Creamer Media Reporter

Comments

 

Showroom

Klüber Lubrication
Klüber Lubrication

Klüber Lubrication ensures that the world’s essential systems—drive units, machines, and water flow—operate efficiently, sustainably, and reliably...

VISIT SHOWROOM 
Schauenburg SmartMine IoT
Schauenburg SmartMine IoT

SmartMine IoT has been developed with the mining industry in mind, to provides our customers with powerful business intelligence and data modelling...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Magazine round up | 13 December 2024
Magazine round up | 13 December 2024
13th December 2024

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.162 0.253s - 199pq - 2rq
Subscribe Now